Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    43s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2022, 05:48

General

  • Target

    SYSTEM.Critical.Upgrade.Win10.0.a1ae65ce5a20f0.msi

  • Size

    2.7MB

  • MD5

    9c8ed3456e1dabd6e56b66ffffd3c0b7

  • SHA1

    e7c57de1ebc26028defa533c4ec1fb764050cd09

  • SHA256

    0c614dec198a74bb6b4c10efce8a4708f74aca9bd1eb20a5953212d221791cba

  • SHA512

    3c14b9c3cea0614405d3f2e2eb99dd4cbd0d6e30492abbe7c84a37f820bd20661b3eb04eb7cd6e1d3318adb2286ef9fa25478cb90bc6e3f908073da5195ade3e

  • SSDEEP

    3072:6aDyTjwAVzJwjUQzzVzfzjzZz1zvzzrzzvztzzNz9zNzzzzhRJg:6aD0jrJwnJ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 5 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\SYSTEM.Critical.Upgrade.Win10.0.a1ae65ce5a20f0.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1048
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\system32\MsiExec.exe
      C:\Windows\system32\MsiExec.exe -Embedding 8EA815F5C4C18534C0385CF59B1BAD99 C
      2⤵
      • Loads dropped DLL
      PID:1212
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
      PID:1004
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000324" "0000000000000060"
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:764

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MSI2.tmp

      Filesize

      80KB

      MD5

      50c32d4bfd44d3de980ab46c5622c7d3

      SHA1

      1b77f96a348ff7618db4f83dde8dea7ada785f60

      SHA256

      6bf6ee6857585eae645e9fef30a4b1cff4419863d572ce1141f7515de65b3cca

      SHA512

      0804f043c346e8c93d1c3e560d084054fe983009471f2805caab0fb063b4f7d779a6ff49a793f7a4f719565959f39185589557befaa9b2e22a86a61ed4b33aed

    • \Users\Admin\AppData\Local\Temp\MSI2.tmp

      Filesize

      80KB

      MD5

      50c32d4bfd44d3de980ab46c5622c7d3

      SHA1

      1b77f96a348ff7618db4f83dde8dea7ada785f60

      SHA256

      6bf6ee6857585eae645e9fef30a4b1cff4419863d572ce1141f7515de65b3cca

      SHA512

      0804f043c346e8c93d1c3e560d084054fe983009471f2805caab0fb063b4f7d779a6ff49a793f7a4f719565959f39185589557befaa9b2e22a86a61ed4b33aed

    • memory/1048-54-0x000007FEFC281000-0x000007FEFC283000-memory.dmp

      Filesize

      8KB